Skip to content

Commit fafff34

Browse files
committed
Quote role names as code
Hopefully acrolinx will not flag them as terminology violations
1 parent 71eb3d0 commit fafff34

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

articles/postgresql/howto-hyperscale-create-users.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -25,15 +25,15 @@ access to database objects, and a newly created Hyperscale (Citus) server group
2525
comes with several roles pre-defined:
2626

2727
* The [default PostgreSQL roles](https://www.postgresql.org/docs/current/default-roles.html)
28-
* *azure_pg_admin*
29-
* *postgres*
30-
* *citus*
28+
* `azure_pg_admin`
29+
* `postgres`
30+
* `citus`
3131

3232
Since Hyperscale is a managed PaaS service, only Microsoft can sign in with the
33-
*postgres* super user role. For limited administrative access, Hyperscale
34-
provides the *citus* role.
33+
`postgres` super user role. For limited administrative access, Hyperscale
34+
provides the `citus` role.
3535

36-
Permissions for the citus role:
36+
Permissions for the `citus` role:
3737

3838
* Read all configuration variables, even variables normally visible only to
3939
superusers.
@@ -44,14 +44,14 @@ Permissions for the citus role:
4444
* [Create PostgreSQL extensions](concepts-hyperscale-extensions.md) (because
4545
the role is a member of azure\_pg\_admin).
4646

47-
Notably, the citus role has some restrictions:
47+
Notably, the `citus` role has some restrictions:
4848

4949
* Can't create roles
5050
* Can't create databases
5151

5252
## How to create additional users
5353

54-
As mentioned, the *citus* admin account lacks permission to create additional
54+
As mentioned, the `citus` admin account lacks permission to create additional
5555
users. To add a user, use the Azure portal interface.
5656

5757
1. Go to the **Roles** page for your Hyperscale server group, and click **+ Add**:
@@ -73,7 +73,7 @@ a tool such as PgAdmin or psql. (See [connecting with
7373
psql](quickstart-create-hyperscale-portal.md#connect-to-the-database-using-psql)
7474
in the Hyperscale (Citus) quickstart.)
7575

76-
For example, to allow *db_user* to read *mytable*, grant the permission:
76+
For example, to allow `db_user` to read `mytable`, grant the permission:
7777

7878
```sql
7979
GRANT SELECT ON mytable TO db_user;
@@ -82,7 +82,7 @@ GRANT SELECT ON mytable TO db_user;
8282
Hyperscale (Citus) propagates single-table GRANT statements through the entire
8383
cluster, applying them on all worker nodes. However GRANTs that are system-wide
8484
(for example, for all tables in a schema) need to be run on every date node. Use the
85-
*run_command_on_workers()* helper function:
85+
`run_command_on_workers()` helper function:
8686

8787
```sql
8888
-- applies to the coordinator node
@@ -102,7 +102,7 @@ to delete the user or reset their password.
102102

103103
![Edit a role](media/howto-hyperscale-create-users/edit-role.png)
104104

105-
The *citus* role is privileged and can't be deleted.
105+
The `citus` role is privileged and can't be deleted.
106106

107107
## Next steps
108108

0 commit comments

Comments
 (0)